Skip to content

Commit d618014

Browse files
authored
Merge branch 'main' into enterprise-server-scripts
2 parents 4cb3cfb + 9332c62 commit d618014

19 files changed

Lines changed: 126 additions & 21 deletions

README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ This repository contains the documentation website code and Markdown source file
55
GitHub's Docs team works on pre-production content in a private repo that regularly syncs with this public repo.
66

77
In this article:
8+
89
- [Contributing](#contributing)
910
- [READMEs](#readmes)
1011
- [License](#license)
@@ -34,6 +35,7 @@ If you have a solution to one of the open issues, you will need to fork the repo
3435
We use GitHub Discussions to talk about all sorts of topics related to documentation and this site. For example: if you'd like help troubleshooting a PR, have a great new idea, or want to share something amazing you've learned in our docs, join us in [discussions](https://github.com/github/docs/discussions).
3536

3637
#### And that's it!
38+
3739
That's how you can get started easily as a member of the GitHub Documentation community. :sparkles:
3840

3941
If you want to know more, or you're making a more complex contribution, check out [Getting Started with Contributing](/CONTRIBUTING.md).
-18.9 KB
Loading
7.86 KB
Loading
-23.6 KB
Loading
-17.9 KB
Loading
-42.4 KB
Loading

content/actions/reference/events-that-trigger-workflows.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -572,6 +572,8 @@ on:
572572

573573
{% data reusables.developer-site.pull_request_forked_repos_link %}
574574

575+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %}
576+
575577
#### `pull_request_target`
576578

577579
This event is similar to `pull_request`, except that it runs in the context of the base repository of the pull request, rather than in the merge commit. This means that you can more safely make your secrets available to the workflows triggered by the pull request, because only workflows defined in the commit on the base repository are run. For example, this event allows you to create workflows that label and comment on pull requests, based on the contents of the event payload.
@@ -589,6 +591,8 @@ on: pull_request_target
589591
types: [assigned, opened, synchronize, reopened]
590592
```
591593

594+
{% endif %}
595+
592596
#### `push`
593597

594598
{% note %}
@@ -689,6 +693,8 @@ on:
689693
types: [started]
690694
```
691695

696+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %}
697+
692698
#### `workflow_run`
693699

694700
{% data reusables.webhooks.workflow_run_desc %}
@@ -711,6 +717,8 @@ on:
711717
- requested
712718
```
713719

720+
{% endif %}
721+
714722
### Triggering new workflows using a personal access token
715723

716724
{% data reusables.github-actions.actions-do-not-trigger-workflows %} For more information, see "[Authenticating with the GITHUB_TOKEN](/actions/configuring-and-managing-workflows/authenticating-with-the-github_token)."

content/developers/webhooks-and-events/webhook-events-and-payloads.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1287,7 +1287,7 @@ The event’s actor is the [user](/v3/users/) who starred a repository, and the
12871287
12881288
{{ webhookPayloadsForCurrentVersion.watch.started }}
12891289
1290-
{% if currentVersion == "free-pro-team@latest" %}
1290+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.21" %}
12911291
### workflow_dispatch
12921292
12931293
This event occurs when someone triggers a workflow run on GitHub or sends a `POST` request to the "[Create a workflow dispatch event](/rest/reference/actions/#create-a-workflow-dispatch-event)" endpoint. For more information, see "[Events that trigger workflows](/actions/reference/events-that-trigger-workflows#workflow_dispatch)."
@@ -1301,6 +1301,7 @@ This event occurs when someone triggers a workflow run on GitHub or sends a `POS
13011301
{{ webhookPayloadsForCurrentVersion.workflow_dispatch }}
13021302
{% endif %}
13031303
1304+
{% if currentVersion == "free-pro-team@latest" or currentVersion ver_gt "enterprise-server@2.22" %}
13041305
### workflow_run
13051306
13061307
When a {% data variables.product.prodname_actions %} workflow run is requested or completed. For more information, see "[Events that trigger workflows](/actions/reference/events-that-trigger-workflows#workflow_run)."
@@ -1321,3 +1322,4 @@ Key | Type | Description
13211322
#### Webhook payload example
13221323
13231324
{{ webhookPayloadsForCurrentVersion.workflow_run }}
1325+
{% endif %}

content/github/administering-a-repository/about-secret-scanning.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@ Service providers can partner with {% data variables.product.company_short %} to
1818

1919
### About {% data variables.product.prodname_secret_scanning %} for public repositories
2020

21+
{% data variables.product.prodname_secret_scanning_caps %} is automatically enabled on public repositories, where it scans code for secrets, to check for known secret formats. When a match of your secret format is found in a public repository, {% data variables.product.company_short %} doesn't publicly disclose the information as an alert, but instead sends a payload to an HTTP endpoint of your choice. For an overview of how secret scanning works on public repositories, see "[Secret scanning](/developers/overview/secret-scanning)."
22+
2123
When you push to a public repository, {% data variables.product.product_name %} scans the content of the commits for secrets. If you switch a private repository to public, {% data variables.product.product_name %} scans the entire repository for secrets.
2224

2325
When {% data variables.product.prodname_secret_scanning %} detects a set of credentials, we notify the service provider who issued the secret. The service provider validates the credential and then decides whether they should revoke the secret, issue a new secret, or reach out to you directly, which will depend on the associated risks to you or the service provider.
@@ -65,6 +67,8 @@ When {% data variables.product.prodname_secret_scanning %} detects a set of cred
6567

6668
{% data reusables.secret-scanning.beta %}
6769

70+
If you're a repository administrator or an organization owner, you can enable {% data variables.product.prodname_secret_scanning %} for private repositories that are owned by organizations. You can enable {% data variables.product.prodname_secret_scanning %} for all your repositories, or for all new repositories within your organization. {% data variables.product.prodname_secret_scanning_caps %} is not available for user account-owned private repositories. For more information, see "[Managing security and analysis settings for your repository](/github/administering-a-repository/managing-security-and-analysis-settings-for-your-repository)" and "[Managing security and analysis settings for your organization](/github/setting-up-and-managing-organizations-and-teams/managing-security-and-analysis-settings-for-your-organization)."
71+
6872
When you push commits to a private repository with {% data variables.product.prodname_secret_scanning %} enabled, {% data variables.product.product_name %} scans the contents of the commits for secrets.
6973

7074
When {% data variables.product.prodname_secret_scanning %} detects a secret in a private repository, {% data variables.product.prodname_dotcom %} sends alerts.
@@ -73,6 +77,8 @@ When {% data variables.product.prodname_secret_scanning %} detects a secret in a
7377

7478
- {% data variables.product.prodname_dotcom %} displays an alert in the repository. For more information, see "[Managing alerts from {% data variables.product.prodname_secret_scanning %}](/github/administering-a-repository/managing-alerts-from-secret-scanning)."
7579

80+
Repository administrators and organization owners can grant users and team access to {% data variables.product.prodname_secret_scanning %} alerts. For more information, see "[Managing security and analysis settings for your repository](/github/administering-a-repository/managing-security-and-analysis-settings-for-your-repository#granting-access-to-security-alerts)."
81+
7682
{% data variables.product.product_name %} currently scans private repositories for secrets issued by the following service providers.
7783

7884
- Adafruit

content/github/administering-a-repository/managing-security-and-analysis-settings-for-your-repository.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,31 +23,31 @@ versions:
2323
4. Under "Configure security and analysis features", to the right of the feature, click **Disable** or **Enable**.
2424
!["Enable" or "Disable" button for "Configure security and analysis" features](/assets/images/help/repository/security-and-analysis-disable-or-enable.png)
2525

26-
### Granting access to {% data variables.product.prodname_dependabot_alerts %}
26+
### Granting access to security alerts
2727

28-
After you enable {% data variables.product.prodname_dependabot_alerts %} for a repository in an organization, organization owners and repository administrators can view the alerts by default. You can give additional teams and people access to the alerts for a repository.
28+
After you enable {% data variables.product.prodname_dependabot %} or {% data variables.product.prodname_secret_scanning %} alerts for a repository in an organization, organization owners and repository administrators can view the alerts by default. You can give additional teams and people access to the alerts for a repository.
2929

3030
{% note %}
3131

32-
Organization owners and repository administrators can only grant access to view {% data variables.product.prodname_dependabot_alerts %} to people or teams who have write access to the repo.
32+
Organization owners and repository administrators can only grant access to view security alerts, such as {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_secret_scanning %} alerts, to people or teams who have write access to the repo.
3333

3434
{% endnote %}
3535

3636
{% data reusables.repositories.navigate-to-repo %}
3737
{% data reusables.repositories.sidebar-settings %}
3838
{% data reusables.repositories.navigate-to-security-and-analysis %}
39-
4. Under "Dependabot alerts", in the search field, start typing the name of the person or team you'd like to find, then click a name in the list of matches.
40-
![Search field for granting people or teams access to Dependabot alerts](/assets/images/help/repository/security-and-analysis-security-alerts-person-or-team-search.png)
39+
4. Under "Access to alerts", in the search field, start typing the name of the person or team you'd like to find, then click a name in the list of matches.
40+
![Search field for granting people or teams access to security alerts](/assets/images/help/repository/security-and-analysis-security-alerts-person-or-team-search.png)
4141
5. Click **Save changes**.
42-
!["Save changes" button for changes to Dependabot alert settings](/assets/images/help/repository/security-and-analysis-security-alerts-save-changes.png)
42+
!["Save changes" button for changes to security alert settings](/assets/images/help/repository/security-and-analysis-security-alerts-save-changes.png)
4343

44-
### Removing access to {% data variables.product.prodname_dependabot_alerts %}
44+
### Removing access to security alerts
4545

4646
{% data reusables.repositories.navigate-to-repo %}
4747
{% data reusables.repositories.sidebar-settings %}
4848
{% data reusables.repositories.navigate-to-security-and-analysis %}
49-
4. Under "Dependabot alerts", to the right of the person or team whose access you'd like to remove, click {% octicon "x" aria-label="X symbol" %}.
50-
!["x" button to remove someone's access to Dependabot alerts for your repository](/assets/images/help/repository/security-and-analysis-security-alerts-username-x.png)
49+
4. Under "Access to alerts", to the right of the person or team whose access you'd like to remove, click {% octicon "x" aria-label="X symbol" %}.
50+
!["x" button to remove someone's access to security alerts for your repository](/assets/images/help/repository/security-and-analysis-security-alerts-username-x.png)
5151

5252
### Further reading
5353

0 commit comments

Comments
 (0)